Attackers sometimes deploy complex "finger-printing" tools
to determine server type. By submitting non-standard HTTP requests (like
DELETE
requests) and broken HTTP headers, they can heuristically determine
the likely server type by examining how it responds in these
ambiguous situations.